Welcome to the Virus Encyclopedia of Panda Security.
It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.
|First detected on:||Aug. 19, 2004|
|Detection updated on:||Aug. 19, 2004|
|Yes, using TruPrevent Technologies
Sdbot.AMR is a worm with backdoor characteristics, which allows hackers to gain remote access to the affected computer in order to carry out actions that compromise user confidentiality and impede the tasks performed.
Sdbot.AMR uses its own IRC client in order to join an IRC channel and accept remote control commands, such as launching denial of service (DoS) attacks against websites. It can also download and run files on the affected computer.
Sdbot.AMR spreads across computer networks. In order to do so, it checks if the affected computer belongs to a network. If so, it attempts to access the network shared resources, using passwords that are typical or easy to guess. Then, it makes a copy of itself to those shared resources.
Sdbot.AMR is difficult to recognize, as it does not display any messages or warnings that indicate it has reached a computer.